AvalZ / modsecurity-cli
A CLI wrapper for libmodsecurity (v3.0.10)
☆11Updated last year
Related projects ⓘ
Alternatives and complementary repositories for modsecurity-cli
- An Adaptive Misuse Detection System☆29Updated 2 weeks ago
- ☆74Updated last week
- An LLM and OCR based Indicator of Compromise Extraction Tool☆31Updated 7 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 3 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆40Updated 2 months ago
- Code for shelLM tool☆46Updated 3 weeks ago
- Signature based honeypot detector tool written in Golang☆84Updated 6 months ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆106Updated last week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆49Updated last month
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆50Updated this week
- CALDERA plugin for adversary emulation of AI-enabled systems☆85Updated last year
- ATLAS tactics, techniques, and case studies data☆49Updated last month
- source code for the offsecml framework☆35Updated 5 months ago
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆75Updated 11 months ago
- Tools used by CSIRT and especially in the scope of CNW☆16Updated last month
- JA4TScan is an active TCP server fingerprinting tool.☆56Updated 2 months ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆23Updated 3 months ago
- ☆83Updated 3 months ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆52Updated 3 weeks ago
- Data Scientists Go To Jupyter☆57Updated last week
- A Self-Contained Open-Source Cyberattack Experimentation Testbed☆35Updated 3 weeks ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆19Updated 3 months ago
- Pythia is a versatile query format designed to facilitate the discovery of malicious infrastructure by seamlessly converting into the syn…☆30Updated 3 months ago
- a hackbot proof-of-concept☆34Updated 8 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆35Updated last month
- ☆32Updated last week
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆38Updated 9 months ago
- Tree of Attacks (TAP) Jailbreaking Implementation☆95Updated 9 months ago
- Repository of tools and resources for analyzing Docker containers☆59Updated last year
- Automated vulnerability discovery and annotation☆62Updated 3 months ago